{"title":"A practical differential power analysis attack against an FPGA implementation of AES cryptosystem","authors":"Mehdi Masoomi, M. Masoumi, M. Ahmadian","doi":"10.1109/I-SOCIETY16502.2010.6018719","DOIUrl":null,"url":null,"abstract":"Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. In recent years, the security of the Advanced Encryption Standard (AES) against Differential (DPA), has received considerable attention. While FPGAs are becoming increasingly popular for cryptographic applications, there are only a few articles that assess their vulnerability to such attacks. The purpose of this paper is to describe a practical and successful implementation of the attack and provide strong evidence that DPA is a serious threat against realizations of the AES on SRAM-based FPGAs without effective countermeasure.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018719","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. In recent years, the security of the Advanced Encryption Standard (AES) against Differential (DPA), has received considerable attention. While FPGAs are becoming increasingly popular for cryptographic applications, there are only a few articles that assess their vulnerability to such attacks. The purpose of this paper is to describe a practical and successful implementation of the attack and provide strong evidence that DPA is a serious threat against realizations of the AES on SRAM-based FPGAs without effective countermeasure.